- From: Patrick Meenan <notifications@github.com>
- Date: Wed, 12 Nov 2025 16:48:30 -0800
- To: whatwg/fetch <fetch@noreply.github.com>
- Cc: Subscribed <subscribed@noreply.github.com>
Received on Thursday, 13 November 2025 00:48:33 UTC
pmeenan left a comment (whatwg/fetch#1839) @noamr mentioned that it sounds a lot like [CORP](https://developer.mozilla.org/en-US/docs/Web/HTTP/Guides/Cross-Origin_Resource_Policy) which is there to provide a way to block side-channel (Spectre) attacks for no-cors requests. If it's not overloading the existing CORP (since it's protecting against the same thing), we could unlock dictionary support for no-cors requests in two ways: 1. Rely on opt-in for sidechannel protection with CORP and just allow dictionary compression for all no-cors requests with CORP blocking the requests that explicitly opt-in to sidechannel attack protection. 2. Default to safe for no-cors but allow an explicit opt-in with `Cross-Origin-Resource-Policy: cross-origin` on the response header as a signal that it's explicitly safe. -- Reply to this email directly or view it on GitHub: https://github.com/whatwg/fetch/issues/1839#issuecomment-3524571107 You are receiving this because you are subscribed to this thread. Message ID: <whatwg/fetch/issues/1839/3524571107@github.com>
Received on Thursday, 13 November 2025 00:48:33 UTC